Assignment Rida
Assignment Rida
Computer
Course Title: Communication Course Code: CEN 223 Credit Hours: 3 (3,0)
s & Networks
Course Program
Haad Akmal BS RIS
Instructor: Name:
Semester: 4th Batch: 2023 Section: C
Number of
Submission Maximum
28-03-2025 5 Extra Sheets 6
Due Date: Marks:
Attached:
Student’s Enrollment
Rida Saman 01-139232-096
Name: Number:
Working Principle:
1. Data Transmission: The sending station transmits a data frame to the receiving station.
2. Acknowledgment Requirement: The receiving station, upon successfully receiving the
data frame, needs to acknowledge its receipt.
3. Piggybacking: Instead of sending a standalone ACK frame, the receiver appends the
acknowledgment information (e.g., the sequence number of the received frame) to its
own data frame that it is transmitting back to the sender.
4. Combined Transmission: The receiver sends a data frame containing both its own data
and the acknowledgment of the received data.
Advantages:
1. Reduced Overhead: By combining data and acknowledgments, piggybacking minimizes
the number of control frames (ACK/NAK) transmitted, reducing network overhead.
2. Improved Efficiency: It optimizes bandwidth utilization, allowing more data to be
transmitted within a given time frame.
3. Enhanced Throughput: Reduced overhead translates to higher network throughput,
leading to faster data transfer rates.
4. Reduced Latency: Fewer control frames mean quicker acknowledgments, reducing
transmission delays.
Real-life Example:
Telnet Sessions: In a Telnet session, a user types characters, and the server responds with
echoes and command outputs. Piggybacking can be used to acknowledge received
characters along with the server's responses, reducing the number of separate
acknowledgment packets.
File Transfer Protocols (FTP): When transferring large files, acknowledgments of
received data blocks can be piggybacked onto subsequent data transmissions.
Limitations:
1. Delay in Acknowledgment: If the receiver has no data to send back, it must delay the
acknowledgment until it has data, which can introduce latency.
2. Complexity: Implementing piggybacking requires more complex protocols and error-
handling mechanisms.
3. Applicability: Piggybacking is most effective in full-duplex communication and may not
be suitable for simplex or half-duplex systems.
4. Buffer Requirements: The receiver must have sufficient buffer space to store incoming
data until it can be piggybacked.
5. Timeout Issues: If the receiver doesn't have data to send back within a certain time, the
sender might time out and retransmit, even if the original data was received.
References Links:
https://www.google.com.pk/
https://www.geeksforgeeks.org/piggybacking-in-computer-networks/
https://www.ccbp.in/blog/articles/piggybacking-in-computer-networks
https://en.wikipedia.org/wiki/Data_link_layer
CSMA CD vs CSMA CA
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) and CSMA/CA
(Carrier Sense Multiple Access with Collision Avoidance)1 are medium access control
protocols used in network communication. They differ in their approach to handling collisions
and are suited for different network environments.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection):
Working Mechanism:
Suitability:
o Primarily used in wired Ethernet networks (IEEE 802.3).
o Effective in environments where collisions can be easily detected, such as wired
networks.
Real-life Examples:
CSMA/CD:
o Ethernet LANs in office buildings, where wired connections allow for accurate
collision detection.
o Industrial control systems using wired Ethernet for reliable communication.
CSMA/CA:
o Wi-Fi networks in homes, public hotspots, and offices, where wireless signals are
prone to interference and hidden node issues.
o Wireless sensor networks used in environmental monitoring.
References Links:
https://www.google.com.pk/
https://en.wikipedia.org/wiki/Carrier-sense_multiple_access_with_collision_avoidanc
https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.pynetlabs.com
%2Fcsma-cd-vs-csma-ca
%2F&psig=AOvVaw2BRhwnchblXrdtODxS3va3&ust=1743263675237000&source=im
ages&cd=vfe&opi=89978449&ved=0CBcQjhxqFwoTCJDn7bGRrYwDFQAAAAAdAA
AAABAc
https://www.geeksforgeeks.org/carrier-sense-multiple-access-csma/#:~:text=CSMA
%2FCD%20detects%20collisions%20and,used%20in%20Wi%2DFi%20networks.
Conclusion
Piggybacking is an effective technique for optimizing data transmission in bidirectional
communication by reducing frame overhead. However, it is not always applicable due to its
dependency on bidirectional data flow. Additionally, CSMA/CD and CSMA/CA serve different
network environments, with CSMA/CD being effective for wired Ethernet networks and
CSMA/CA being crucial for wireless networks. Understanding these mechanisms helps in
designing efficient communication systems and selecting the right protocol for specific
applications.